![]() ![]() What this means is that you, and the staff who have access to your finances and accounts need to be extremely vigilant when it comes to dealing with phone calls from people claiming to be from banks and financial institutions, or who are eager to get additional details or sell you services that may require you to divulge any further personal information. “However, criminals can use this information to trick you into disclosing your confidential banking details.” “The compromise of personal information can create opportunities for criminals to impersonate you but does not guarantee access to your banking profile or accounts,” said CEO of the South African Banking Risk Information Centre (SABRIC), Nischal Mewalall. ![]() Despite how bad it sounds the breach does have one very clear silver-lining. The first thing to do is to simply not panic. As a result businesses are advised to take numerous steps to prevent any damage that may result from the leak. While the breach has been reported to authorities, and South African banks have been working with Experian and the South African Banking Risk Centre (Sabric) to identify which of their customers may have been exposed to the breach and to protect their personal information, the investigation has not yet been concluded. Steps to take to protect yourself and your business This does not, however, mean that the danger is over. Experian said that the data had then been placed on a third-party data sharing site on the internet, but added that subsequently that third party had “disabled the links” and that the data had “been removed” after Experian was successful in obtaining and executing an Anton Piller order. Information was also leaked for 793,749 business entities and included: names of the companies contact details VAT numbers and banking details. Nexia SAB&T Conference and Training FacilitiesĪccording to official communications from Experian, a consumer, business and credit information services agency, an individual in South Africa claiming to represent a legitimate client fraudulently requested services from it and was simply given the personal information of clients including cell phone numbers home phone numbers work phone numbers employment details and identity numbers.Insolvencies and Deceased Estates Administration.Forensics Services, Investigations, Auditing and Accounting.Benefits of Leveraging a Digital Workforce.Automation Anywhere Digital Workforce, how it works.Robotic Process Automation (RPA) and Digitisation.Information Technology Audit and Assurance.Business Consulting and Advisory Services. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |